A Treehouse with Custom Windows: Minimum Distortion Embeddings into Bounded Treewidth Graphs

Size: px
Start display at page:

Download "A Treehouse with Custom Windows: Minimum Distortion Embeddings into Bounded Treewidth Graphs"

Transcription

1 A Treehouse with Custom Windows: Minimum Distortion Embeddings into Bounded Treewidth Graphs Amir Nayyeri Benjamin Raichel Abstract We describe a (1 + ε)-approximation algorithm for finding the minimum distortion embedding of an n- point metric space X into the shortest path metric space of a weighted graph G with m vertices. The running time of our algorithm is m O(1) n O(ω) (δ opt ) ω (1/ε)λ+2 λ (O(δ opt)) 2λ parametrized by the values of the minimum distortion, δ opt, the spread,, of the points of X, the treewidth, ω, of G, and the doubling dimension, λ, of G. In particular, our result implies a PTAS provided an X with polynomial spread, and the doubling dimension of G, the treewidth of G, and δ opt, are all constant. For example, if X has a polynomial spread and δ opt is a constant, we obtain PTAS s for embedding X into the following spaces: the line, a cycle, a tree of bounded doubling dimension, and a k-outer planar graph of bounded doubling dimension (for a constant k). School of Electrical Engineering and Computer Science; Oregon State University; nayyeria@eecs.oregonstate.edu; Work on this paper was partially supported by NSF CRII Award Department of Computer Science; University of Texas at Dallas; Richardson, TX 75080, USA; benjamin.raichel@utdallas.edu; ~bar150630/. Work on this paper was partially supported by NSF CRII Award Introduction If (X, d X ) and (Y, d Y ) are two metric spaces, an embedding of X into Y is an injective map f : X Y, with the expansion e f and the contraction c f defined as follows. e f = max x,x X x x d Y (f(x), f(x )) d X (x, x, ) d X (x, x ) c f = max x,x X d Y (f(x), f(x )). x x Then, the distortion of f is defined as δ f = e f c f. A low distortion embedding of X into Y is evidence that X is similar to (a subset of) Y. Therefore, computing embeddings is crucial for measuring the similarity of geometric objects in applications like pattern matching and pattern recognition. As is the case considered in this paper, in such settings X and Y are often finite point sets, sampled in some fashion from the objects being compared. In other areas of computer science, such as machine learning, low distortion embeddings are often used as a means to simplify the input metric, where in such cases Y is often considered to be a continuous host space such as R d. Moreover, data visualization requires low distortion embeddings into Euclidean spaces of dimension three or less. Due to the wide range of applications, metric embeddings have been extensively studied in the last few decades, resulting in a rich array of results. Some notable results include: any n-point metric embeds O(log n) into l2 with O(log n) distortion [Bou85], any n- point Euclidean metric embeds into l O(log n/ε2 ) 2 with 1+ε distortion [JL84], and any n-point metric embeds into a distribution of tree metrics with O(log n)- distortion [Bar96, FRT03]. For a lot more results and applications we refer the interested reader to the survey papers by Matousek and Indyk [Mat13, IM04, Ind01]. Finite metrics into weighted graphs Here, we seek approximation algorithms for embedding an n-point metric space (X, d X ) into a metric space

2 (V G, d G ), where G = (V G, E G ) is a given weighted undirected graph and d G is its shortest path metric. One commonly considered case is when G is simply a weighted path, and we first briefly review results for this special case. Embedding into a path. Perhaps the most well studied case is when X is the shortest path metric of an unweighted graph and G is further restricted to be an unweighted path. Badiou et al. [BDG + 05] show that the problem is APX-hard, and describe an O(δ)-approximation algorithm as well as an n O(δ) exact algorithm, where δ is the minimum distortion. Fellows et al. [FFL + 13] improved their exact algorithm to an O(nδ 4 (2δ + 1) 2δ ) time exact algorithm. For embedding a general metric space into an unweighted path, Badiou et al. [BCIS05] provided an O( 3/4 δ O(1) )-approximation algorithm, where is the spread of X. They also show that it is hard to approximate the minimum distortion within any polynomial factor, even if X is a weighted tree with polynomial spread. Recently, Nayyeri and Raichel [NR15] gave two improved results for embedding into weighted paths. First, when X is also a weighted path of the same cardinality (i.e. the embedding is bijective), a δ O(δ2 log 2 D) n O(1) time exact algorithm was given, where D is the largest edge weight in X. The second result in [NR15], allowed X to be a general metric space (of potentially smaller cardinality), and gave a O(δ2) (mn) O(1) time O(1)-approximation algorithm, where m is the number of vertices of the path, and is the spread of X. Theorem 1.1 below, extends this approach to handle embedding into a much more general class of graphs than weighted paths. Moreover, it improves the O(1) factor of approximation to (1 + ε). Moving to these more general settings is a far more challenging endeavor. Embedding into more general graphs. The problem already becomes significantly more involved when G is a tree instead of a path. 1 Kenyon et al. [KRS04] developed an exact O(n 2 2 λδ3 ) time algorithm to compute an optimal bijective embedding from an unweighted graph into an unweighted tree of maximum degree λ. Fellows et al. [FFL + 13] furthered this result by developing a n 2 V (T ) 2 O((5δ)λδ+1 δ) time algorithm for embedding an unweighted graph into an unweighted tree with maximum degree λ. For more general graphs than trees, however, the 1 See references [BIS07, BDH + 08, CDN + 10] for results about embedding into trees. We emphasize that the goal in these papers is different as they look for the best tree that X can be embedded into, whereas in our setting the tree, G, is given in the input. authors are unaware of any similar results. Thus our main result, theorem 1.1 below, represents a significant step forward as it implies a (1+ε)-approximation algorithm for embedding general metric spaces into more general graphs, facilitated by parameterizing on the treewidth and doubling dimension. Our Result Theorem 1.1. Let (X, d X ) be an n-point metric space with spread. Let G = (V G, E G ) be a weighted graph of treewidth ω and doubling dimension λ, with m vertices. Let δ opt be the minimum distortion of any embedding of X into V G. There is a m O(1) n O(ω) (δ opt ) ω (1/ε)λ+2 λ (O(δ opt)) 2λ time (1 + ε)-approximation algorithm for computing the minimum distortion embedding of X into G. In particular, Theorem 1.1 yields a PTAS provided an X with polynomial spread, and the doubling dimensions of G, the treewidth of G, and δ opt, are all constant. For example, if X has a polynomial spread and δ opt is a constant, we obtain PTAS s for embedding X into the following spaces: the line, a cycle, a tree of bounded doubling dimension, and a k-outer planar graph of bounded doubling dimension (for a constant k). While it is not the focus of this paper, it is worth noting our results imply that in certain special cases we can approximately embed into continuous spaces. For example, the continuous line can be viewed approximately as a dense enough subdivision of a graph with a single edge. This observation was used in [NR15] to approximately embed into the continuous line, and more generally can be used when subdivision does not increase the doubling dimension, for example for the case of the continuous cycle. 2 Preliminaries Subspaces. Let G = (V G, E G ) be a graph, and let U V G. We denote by G[U] the induced subgraph by U. We use diam(u) to denote the diameter of G[U], the maximum distance between any pair of vertices in G[U]. Note that the distance is in the induced subgraph, for example, if U is composed of two non-adjacent vertices then its diameter is not finite. Given a metric space (X, d X ), and x X, the ball B(x, R) (of radius R with center x) is a subset of X composed of all points in X that are at distance at most R from x. More generally, for a subset X X, we use the notation B(X, R) to denote the set of all points in X that are at distance at most R from X, i.e. the union of balls centered at the points in X.

3 Tree decomposition and treewidth. A tree decomposition of a graph G = (V G, E G ) is a pair (V T, T ), where V T = {B 1, B 2,..., B k } is a family of subsets of V G that are called bags, and T is a tree whose vertex set is V T, with the following properties: (1) B V T B = V G. (2) For each edge (u, v) E G there is a bag B V T that contains both u and v. (3) For any v V G, any pair B i, B j V T, and any B t V T that is on the unique B i -to-b j path in T, if v B i B j then v B t. The width of a tree decomposition is the size of its largest bag minus one. The treewidth of a graph is the minimum width among its valid tree decompositions. For example, a tree has treewidth one, a k-outerplanar graph has treewidth O(k), and a planar graph with n vertices has treewidth O( n) (implied by the separator theorem). The treewidth ω of a graph can be exactly computed in ω O(ω3) n time by the algorithm of Bodlaender [Bod93]. In this paper, we use the following result to estimate the treewidth up to a constant factor. See Bodlaender et al. [BDD + 13] for a survey of algorithms on treewidth computation. Lemma 2.1. ( [BDD + 13], Theorem I) Let G be a graph with m vertices and treewidth ω. There exists a 2 O(ω) m time algorithm to return a tree decomposition of G of width O(ω). Doubling Dimension. The doubling dimension of a metric space (X, d X ) is the smallest constant λ such that, for any R R +, any ball of radius R in X can be covered by at most 2 λ balls of radius R/2. An n-point metric space is doubling if its doubling dimension is a constant (independent of n). Doubling dimension was first introduced by Assouad [Ass83]. We find the following observation of Gupta et al. [GKL03] helpful in this paper. Lemma 2.2. ( [GKL03], Proposition 1.1) Let (Y, d Y ) be a metric with doubling dimension λ, and let Y Y. If all pairwise distances in Y are at least l, then any ball of radius R in Y contains at most ( ) 2R λ l points of Y. 2 Total and partial maps. Let A and B be two sets. A partial map f from A to B is denoted by f : A B. The domain of f, denoted by Dom(f), is the set of all a A for which f(a) is defined. So, 2 Note that λ in their paper is the doubling constant, whereas in this paper it denotes the doubling dimension. Dom(f) A. The Image of f, denoted by Im(f), is the set of all b B such that b = f(a) for some a A. So, Im(f) B. In the special case that A = Dom(f), we call f a total map, or simply a map, and we denote it by f : A B. Distortion. Let (X, d X ) and (Y, d Y ) be two metric spaces. An embedding of X into Y is an injective map f : X Y. The expansion e f and the contraction c f of f are defined as follows. e f = max x,x X x x d Y (f(x), f(x )) d X (x, x, ) d X (x, x ) c f = max x,x X d Y (f(x), f(x )). x x The distortion of f is defined as δ f = e f c f. It follows by definition that distortion is invariant under scaling of either of the sets. An embedding is noncontracting if the contraction is 1. The following lemma (whose variants can be found in previous papers (e.g., [KRS04])) allows us to restrict our attention to non-contracting embeddings of expansion δ, where δ is a known value. Lemma 2.3. ( [NR15], Lemma 3.2) Let (X, d X ) and (Y, d Y ) be finite metric spaces of sizes n and m, respectively. Then the problem of finding an embedding of X into Y with minimum distortion reduces to solving (mn) O(1) instances of the following problem: given a real value δ 1, compute a non-contracting embedding of X into Y with expansion at most δ, or correctly report that no such embedding exists. In this paper, we consider embedding an n- point metric space (X, d X ) into an m-point metric space (V G, d G ) induced by the shortest path metric of a weighted graph G = (V G, E G ). Assume that for any pair x, y X, 1 d X (x, y), and min x,y X d X (x, y) = 1. will be called the spread of X. Also assume, V G = m n. Let λ denote the doubling dimension of G. Note that m, the size of G, can be much larger than n, the size of X. The following lemma breaks the problem of embedding X into G into m independent problems of embedding X into smaller subgraphs of G. As a result, we obtain a more efficient algorithm particularly when m is much larger than n. Lemma 2.4. There exists a ball B of radius 2δ centered at a vertex of G, such that X embeds into G[B] with distortion δ. Proof. Let f : X V G be a non-contracting embedding of expansion δ, and let v V G be

4 any vertex that f maps onto. As the expansion is δ the image of f is contained in B(v, δ ). Let u, u V G be any two vertices that f maps onto, so u, u B(v, δ ). Since the expansion is δ, we have d G (u, u ) δ, thus, all vertices of the shortest u- to-u path are inside the ball B(v, 2δ ). Therefore, B(v, 2δ ) contains all vertices that f maps onto. It also contains the shortest path between every pair of vertices in the image of f. So, the restriction of f gives is an embedding of X into G[B(v, δ )] of distortion δ. Remark 2.1. In light of Lemma 2.4, we assume that G has diameter at most 4δ. Our final algorithm tries all possibilities for B at the price of a factor of m in the running time. 3 Overview of the Approach Suppose we know there is an embedding f of X into G of distortion at most δ. To find f naively we could guess all possible embeddings, which can be viewed as having a list for each vertex in G of the possible vertices from X that can map onto it, where each guess of f consists of choosing one item from each of these lists. One issue with this approach is that selecting an item from a list tells you no information about how the other members of X should map into G, resulting in blindly trying all possible combinations of items from the lists (like putting a jigsaw puzzle together in the dark). Therefore, for each vertex v in G rather than only guessing which point in X maps onto v, we guess an approximate view of what the image of all points in X look like when sitting at the vertex v. As we are concerned with relative approximations, points whose image is far from v, do not need to be seen as clearly. Specifically, if a point maps within a ball centered at v with radius O(δ s+1 ), then we approximate the location of its image with a ball of radius O(δ s ). This motivates the definition of focused views from Section 4. So now rather than having a list of possible points at each vertex, we have a list of possible focused views. This is potentially problematic as previously the list sizes where only X, but as focused views are more expressive, the sizes of these lists have grown significantly. Fortunately, one can avoid enumerating all focused views and hence keep manageable list sizes, and this is the focus of Section 5. Roughly speaking, this reduction is achieved by finding an approximate image of a net of X rather than all of X, where each point not in the net maps to the same region as its nearest neighbor in the net. This is the most technically challenging portion of the paper, and while this section and the ideas it contains are crucial for our approach, this section can be viewed as giving a black box list size reduction. At this point we know focused views result in larger list sizes, so what is their benefit? If v is a cut vertex in G, then a focused view not only tells us about the local neighborhood of v, but also for points in X whose image is further away, it tells us which component of G \ v they map to. That is, a cut in G induces a cut in X, implying that dynamic programming may be possible. The remaining issue is that in order to extract f we need a focused view at each vertex in G, and while in a tree every (non-leaf) vertex induces a cut, this is not the case for more general graphs. This is where tree decomposition comes into play, as each bag in a tree decomposition induces a cut. Hence instead of guessing focused views centered around each vertex in G, we guess focused views centered around the collection of vertices in each bag in the decomposition. Many elements of this approach appeared in [NR15], though in a much rougher form, when the authors considered the much simpler case of embedding into a subset of the real line. In particular, handling the much more general class of graphs considered in this paper not only required a number of new elements and insights 3, but also would not have been possible without significant simplification, restructuring, and a better overall understanding of the approach, as described above. This better understanding also gives a strict improvement over the previous paper even for the case of the real line, as now we have a 1 + ε rather than a (large) constant approximation. Naturally the above is only a rough sketch, and the details are far more involved. Therefore, in the different parts of the argument below we provide further intuition in line about the specific details of how the above story is put into action. 4 Focused Views In this section we formally define focused views and related terms, and prove some basic facts about them. As discussed in Section 3, a focused view of a subset U V G, assigns every x X to a corresponding approximate location in V G. The accuracy of this 3 This includes netting in G in addition to X, having a parameter allowing us to fine tune the radii of views to match the desired accuracy, generalizing the notion of the center of a view both with respect to the number of components it induces and its size, and more. In general, these new pieces are too technical in nature to be understood in the context of the above high level overview, though they will become clear later in the paper.

5 approximate location varies, being highly accurate near U, and less accurate as one moves away from U. Naturally, for any embedding f there is at least one corresponding focused view, though conversely a focused view may not comply with any embedding f. Let ρ R and ρ max(1/(δ 1), 4). Also, let U V G, and let S = log δ + 1. A collection of maps F = {f 0, f 1,..., f S 1 }, where for each 0 s < S, f s : X 2 V G with the following properties is called a focused view at U. For each 0 s < S, and each x X, f s (x) is either (1) a non-empty subset of V G of diameter less than δ s that intersects B(U, ρδ s+1 ), or (2) it is V G \B(U, ρδ s+1 ). U is called the center of F, and ρ is the span of the view. For each 0 s < S, we call f s the scale s view of F. A point x is visible at scale s if condition (1) holds for it, and invisible at scale s otherwise. Each scale s view provides an estimate for the image of x. Intuitively, these estimates are more accurate when s is smaller if the image of x is sufficiently close to the center. In particular, if x is visible at scale zero then f 0 (x) is a set consisting of a single point, though we sometimes abuse notation and refer to f 0 (x) directly as a point. A possibly more accurate estimation for the image of x can be provided by taking into account estimates of all scales, we denote this estimation by F (x), defined below. F (x) = 0 s<s f s (x). We say F is a focused view of an embedding f, if f(x) F (x) (equivalently, for any x X, and any 0 s < S, f(x) f s (x)). Conversely, f is called an extension of F. An embedding is feasible if it is non-contracting and its expansion is at most δ. A focused view is feasible if it can be extended to a feasible embedding. Ideally, we would like to work with feasible focused views. However, verifying if a focused view is feasible locally seems to be impossible. Instead, we define the weaker notion of plausibility. Intuitively, a focused view, F, is plausible if one cannot conclude it is not feasible by locally examining it. Formally, F is plausible if for all x, y X, there are u F (x) and v F (y) such that: 1 d G (v, u)/d X (x, y) δ. Note that the plausibility of F in particular implies that for all x X, F (x). In turn, it is implied that every x X is visible at scale S 1, because V G \B(U, ρδ S ) = by Remark 2.1 as ρ 4. Furthermore, we now show that a sufficiently large choice of ρ guarantees that once a point is visible at some some s, it remains visible for all larger scales. Lemma 4.1. Let F be a plausible focused view at U of span ρ 1/(δ 1). For any x X, and any 0 s s < S, if x is visible under F at scale s then it is also visible at scale s. Proof. We show that for any 0 < s < S, if x is visible at scale s 1 then it is visible at scale s. The statement of the lemma will be implied by induction. The vertex subset f s 1 (x) has diameter δ s 1, and it intersects B(U, ρδ s ). Therefore, it is completely inside B(U, ρδ s + δ s 1 ). Since ρ 1/(δ 1), we have ρδ s + δ s 1 ρδ s+1, so, f s 1 (x) B(U, ρδ s+1 ), or equivalently f s 1 (x) does not intersect V G \B(U, ρδ s+1 ). As F is plausible, F (x), and hence x is visible at scale s. Plausibility, of a focused map can be easily checked in polynomial time by computing F (x) for all x X, and testing the plausibility condition for each pair of x, y X, by considering every choice of u F (x) and v F (y). Consequently, we have the following lemma. Lemma 4.2. Let F be focused view at U V G. There is a n O(1) (δ ) O(λ) time algorithm to decide whether F is plausible or not (provided that V G = (δ ) O(λ) ). 4.1 Aggregating focused views We wish to aggregate several focused views to recover a nearly optimal embedding. Here we show this recovery is possible, provided a set of focused views that yields a sufficient amount of non-contradictory information. Let F be a collection of plausible focused views. We say that F is a complete set of focused views if for each x X, we have: (1) F F F (x), and (2) there is an F = {f 0, f 1,..., f S 1 } F at a subset U V G, such that f 0 (x) U. A complete set of focused views imply a unique embedding of X into G. We define h F to be this unique embedding, the aggregation of all scale zero views. (4.1) h F = {f 0,...,f S 1 } F f 0. We call h F the global view of F, and we show that h F is a nearly optimal embedding. First, we show that h F is an embedding.

6 Lemma 4.3. Let F be a complete set of focused views, and let h F be its global view. We have that h F is an embedding of X into V G. Proof. Property (2) ensures that h F acts on every point in X. Property (1) ensures that for each x X and F, F F if x Dom(f 0 ) and x Dom(f 0) then f 0 (x) = f 0(x), thus, h F (x) is a well-defined function. It remains to show that h F is one-to-one: for any x, y X, x y implies h F (x) h F (y). Since F is a complete set of focused views it contains a focused view F = {f 0, f 1,..., f S 1 } F at U V G, such that f 0 (x) U. Note that f 0 (x) is a point, so h F (x) = f 0 (x). If y is visible at scale zero, then f 0 (y) f 0 (x) because of plausibility of F, thus, h F (x) h F (y). Otherwise, f 0 (y) = V G \B(U, ρδ). By Property (2) of a complete set of focused views we have h F (y) f 0 (y), in particular, h F (y) f 0 (x) = h F (x). Next, we show that h F has bounded distortion. Lemma 4.4. Let F be a complete set of focused views of span ρ, and let h F be its global view. We have that h F is an embedding with distortion at most (ρ + 1)δ/(ρ 1). Proof. Let x, y X, and let h = h F. We show ( 1 1 ) d ( G(h(x), h(y)) ) δ. ρ d X (x, y) ρ Let U V G be such that there is F F at U with f 0 (x) U. Such U and F exists as F is a complete set of focused views. Thus, we have h(x) = f 0 (x). Let 0 s < S be the smallest scale, in which y is visible. If s = 0, then h(y) = f 0 (y), and the plausibility of F implies 1 d G(h(x), h(y)) δ. d X (x, y) Otherwise, because F is plausible, there is a v f s (y) such that (4.2) 1 d G(h(x), v) d X (x, y) δ. Since f s (y) has diameter less than δ s, (4.3) d G (h(y), v) δ s. On the other hand, y is not visible at scale s 1, so, h(y) / B(U, ρδ s ). (4.4) d G (h(x), h(y)) ρδ s. Combining (4.3) and (4.4), we obtain d G (h(y), v) 1 ρ d G(h(x), h(y)). Using the triangle inequality, we obtain (4.5) and (4.6) d G (h(x), v) d G (h(x), h(y)) + d G (h(y), v) ( ) ρ d G (h(x), h(y)), d G (h(x), v) d G (h(x), h(y)) d G (h(y), v) ( ) 1 1 ρ d G (h(x), h(y)). We combine (4.2) and (4.5) to bound the expansion. ( d G (h(x), h(y)) ) ( v) dg(h(x), ) δ. d X (x, y) ρ d X (x, y) ρ Similarly, we combine (4.2) and (4.6) to bound the contraction. ( d G (h(x), h(y)) 1 1 ) dg(h(x), ( v) 1 1 ). d X (x, y) ρ d X (x, y) ρ 4.2 Pairwise consistency A nearly optimal embedding can be deduced from a complete set of focused views as promised by Lemma 4.4, therefore, all we need is such a complete set. To compute this complete set our algorithm proceeds in three steps: (i) choose an appropriate set of centers for our focused views, (ii) find a relatively small list of focused views at each chosen center, and (iii) extract a complete set by picking one element from each list. Step (iii) is the most challenging step, and to accomplish this step we will need a stronger notion of consistency between the focused view than what is provided by property (1) of a complete set of views, and this notion of consistency is described below. Naturally, ensuring this stronger notion of consistency, requires an appropriate choice of the centers and list in steps (i) and (ii), and this is discussed in the next section. We say that F and F at U and U, respectively, are consistent, if for each x X, and each 0 s < S the following two properties hold. (1) If x is visible under F and not visible under F at scale s then f s (x) is disjoint from B(U, ρδ s+1 ). Similarly, if x is visible in F and not visible in F at scale s then f s(x) is disjoint from B(U, ρδ s+1 ). (2) if x is visible at scale s under both F and F then f s (x) = f s(x). Note that (1) and (2) are much stronger than what we needed for a pair of focused views in a complete set. For example, (2) requires that the estimates of F and F of x at a given scale s be exactly the same if x is visible at scale s under both of them. On the

7 other hand, F and F can be in a complete set if their estimations for x are merely not completely disjoint. Consistency, of a pair of focused views can be easily checked in polynomial time by checking conditions (1) and (2) for each x X and 0 s < S in V G O(1) time, leading to the following lemma. Lemma 4.5. The consistency of two focused views can be tested in n O(1) (δ ) O(λ) time (provided that V G = (δ ) O(λ) ). The following lemma shows that the pairwise consistency of the elements of a set of focused views into a cover of V G implies the completeness of the set. Lemma 4.6. Let U be a family of subsets of V G that covers V G. Let F be a collection of plausible focused views, one at each member of U. If every pair of focused view in F are consistent, then F is a complete set of focused views. Proof. First, we show that for any 0 s < S and x X there is an F F under which x is visible at scale s. This statement, in particular, implies that x is visible at scale zero under some focused view, the second property of a complete set of focused views. Since F is plausible, every x X is visible at scale S 1 under F. So, let 0 s < S 1. By the induction hypothesis, there is F = {f 0, f 1,..., f S 1 }, under which x is visible at scale s + 1. Let U U be any a subset of V G that intersects f s+1(x), and let F = {f 0, f 1,..., f S 1 } F be the focused view at U. Such a U exists because U covers V G. The consistency of F and F implies that f s+1 (x) = f s+1(x). The plausibility of F implies that f s (x) intersects f s+1 (x). But, f s+1 (x) is completely inside B(U, ρδ s+1 ), as it intersects U, and its diameter is less than δ s+1. Therefore, f s (x) must intersect B(U, ρδ s+1 ), that is x is visible under F at scale s. To show the first property of a complete set of focused views, let x X, and let F = {f 0, f 1,..., f S 1 } F be a focused view at U under which x is visible at scale zero. By Lemma 4.1, x is visible at all scales under F. For any other focused view F = {f 0, f 1,..., f S 1 }, and any scale 0 s < S, we have that f s(x) f s (x), since if x is visible at scale s under F, f s(x) = f s (x) (the second property of consistency), and if x is not visible then f s(x) f s (x) (the first property of consistency). Hence, all estimations for the image of x contain f 0 (x), so, their intersection is not empty. 5 Enumerating focused views Given an appropriate set of centers, we wish to compute focused views at these centers that can be aggregated into nearly optimal embeddings. In this section, we show how to compute a relatively short list of focused views at each center that contains a focused view of every feasible embedding. In particular, for any feasible f, each of our lists contains a focused view of f at its corresponding center. We build our focused views so that views of a single f at different centers are consistent, ensuring these lists contain a complete set of focused views, which our algorithm in the next section describes how to extract. The goal of this section is thus to prove the following. Lemma 5.1. For any U 1,..., U k V G, and ρ 1, there is an algorithm to compute a list of n Ui (δ ) Ui (1+log δ ρ) λ (O(ρδ2 )) λ focused views of span ρ at each U i that contains a focused view of every feasible embedding in k n α+1 (δ ) α (1+log δ ρ) λ (O(ρδ2 )) λ time, where α = max 1 i k U i. Moreover, any pair of focused views of a feasible f computed by this algorithm are consistent. To build the candidate lists of focused views around each U i described in the above lemma, we first build a relatively small list of choices for f s for each s, and then combine these lists. Recall that f s provides a δ s accurate image of every x X at distance O(δ s+1 ) of U i. We show that f s can be deduced if a δ s /3 accurate image of a δ s 1 /3-net, X s 1, in X is provided around U i. We then determine f s (x) for each x by looking at the image of its nearest neighbor z in X s 1. To limit the possibilities for the image of any point, we also use a fixed set of bins of diameter δ s /3 defined over the vertices of G. The list of possible choices for f s is then constructed by enumerating all possible mappings onto U i, and for each mapping, all possible assignments of the net points to the set of bins which intersect the visible range of U i. 5.1 Nets and Bins Nets on X. Let (x 1, x 2,..., x n ) be the Gonzalez permutation of X computed as follows. The point x 1 is an arbitrary point in X. For every 2 i n, the point x i X\{x 1,..., x i 1 } is the farthest point from the set {x 1,..., x i 1 }. For each 0 s < S, the set X s is composed of the points in the maximal prefix of (x 1, x 2,..., x n ), in which the mutual distances of the points are at least δ s /3. Note that for any s 0, X s = X. The scale of a point x X, is the largest s such that x X s. For any point x X, and any 0 s < S, we denote by nn s (x) the nearest point of X s to x. For example, if x X s then nn s (x) = x.

8 For the remainder of the paper we assume that we have precomputed the sets X s = X s \X s+1, for all s {0, 1,..., S 1}. Additionally, we also precompute for each x X and for each 0 s < S, the nearest neighbor of x in X s. This can all be done in (Sn) O(1) time. We find the following implication of Lemma 2.2 helpful in the paper. Lemma 5.2. Any ball B of radius R in X contains at most ( 6R δ s 1 ) λ points from X s. Proof. Let f : X V be a non-contracting distortion δ embedding. The image f(b) will be contained in a ball B of radius δr of G. In particular, we have f(x s ) B X s B. Additionally, since f is non-contracting the distance between any pair of points in f(x s ) is at least δ s /3. Lemma 2.2 then implies that ( ) λ 6δR f(x s ) B = δ s ( ) λ 6R δ s 1. Bins in G. We use predefined bins to estimate the images of the net points. A family of bins { 0, 1,..., S+1 } of density α and accuracy β in G is a family of partitions of V G with the following properties: (1) For each 0 s < S and any bin b s, G[b] is a subgraph with diameter smaller than δ s /β. (2) For each 0 s < S and any D 1, any diameter D subgraph of G intersects at most (O(βDδ s )) α bins of scale s. Each element in s is called a bin of scale s. In particular, a bin of scale zero contains exactly one vertex. Lemma 5.3. For any β 1, there is a family of bins of density λ and accuracy β in G that can be computed in m O(1) time. Proof. For each 0 s < S, let V s be composed of the elements of the longest prefix of the Gonzalez permutation of V G, in which the mutual distances between vertices is at most δ s /(2β). For each v V s let the scale s bin b v centered at v be the set of all vertices in V G that are closer to v than any other vertex in V s (break the ties arbitrarily). By the definition of V s, for each u b v we have d G (u, v) < δ s /(2β), thus, the diameter of b v is at most δ s /β. Let s be the set of all scale s bins. The argument above ensures property (1). It remains to prove property (2) for s. Let G = (V G, E G ) be a subgraph of diameter D. Let v V G, and consider the ball B = B(v, D + δ s /β). Any scale s bin that intersects V G is completely contained in B. We bound the number of scale s bins in B. Let U be the set of centers of such bins. As U V s, the mutual distance between points of U is at least δ s /(2β). Therefore, Lemma 2.2 implies: U ( 2D + 2δ s ) λ /β δ s = ( O(βDδ s ) ) λ. /(2β) The Gonzalez permutation and the set of bins in every scale can be computed in m O(1). This lemma implies that a family of bins of density λ and accuracy 3 exists in G. For the rest of this paper, let { 0, 1,..., S+1 } be such a family. That is the diameter of a scale s bin is smaller than δ s / Net views vs. focused views A collection of partial maps N = {η 0, η 1,..., η S 1 }, where for each 0 s < S, η s : X s 1 s, is called a net view. For any 0 s < S, η s is called the scale s map of the net view. Note the domain of η s is X s 1, which is a δ s 1 /3 net. Let f be an embedding of X into G, and for each x X, let b s (x) s denote the unique bin of scale s that contains f(x). For any r > 1, and U V G the span r net restriction of f into U, is a net view N = {η 0, η 1,..., η S 1 } defined as follows. For each 0 s < S, x X s 1, (1) if b s (x) intersects B(U, rδ s+1 ) then η s (x) = b s (x), (2) otherwise, η s does not act on x. Note that a net restriction looks like a focused view, except η s is only defined on the net X s 1, and its images has slightly smaller diameters. We now define how to extend it to a focused view by mapping each x X roughly to the same set mapped onto by z = nn s 1 (x). Specifically, if z is visible we map x to the same bin as z, enlarged by an additive factor of δd X (x, z) to account for the error in approximating the location of the image of x by the image of z. For a span r net restriction, N = {η 0, η 1,..., η S 1 }, of an embedding into U, we define its induced focused view F = {f 0, f 1,..., f S 1 } as follows. For each x X, and 0 s < S, (1) if η s acts on nn s 1 (x), and B = B(η s (nn s 1 (x)), δ d X (x, nn s 1 (x))) intersects B(U, (r 1)δ s+1 ) then f s (x) = B,

9 (2) otherwise, f s (x) = V G \B(U, (r 1)δ s+1 ). Note that nn 1 (x) = x, therefore, f 0 (x) = η 0 (x), which is a vertex, if η 0 (x) is defined, otherwise f 0 (x) = V G \B(U, (r 1)δ). Lemma 5.4. Let f be a feasible embedding, U V G, N be the span r net restriction of f into U, and F be the focused view induced by N. We have that F is a span r 1 focused view of f. Moreover, F can be computed from N in n(δ ) O(1) time. Proof. It is immediate from the definition of induced focused views that f s (x) is either a subset of diameter at most δ s that intersects B(U, (r 1)δ s+1 ) or it is V G \B(U, (r 1)δ s+1 ), for every x X, and 0 s < S. We show that f(x) f s (x). To this end, we consider two cases. Let z = nn s 1 (x) in the rest of the proof. First, suppose η s acts on z, and let B x = B(η s (z), δ d X (x, z)). We have f(x) B x because f(z) η s (z), and f has expansion at most δ. If B x intersects B(U, (r 1)δ s+1 ) then f s (x) = B x f(x), otherwise, f s (x) = V G \B(U, (r 1)δ s+1 ) B x f(x). Second, suppose that η s does not act on z, so, f s (x) = V G \B(U, (r 1)δ s+1 ). Additionally, b s (z), the scale s bin that contains f(z), does not intersect B(U, rδ s+1 ), that is d G (f(z), U) rδ s+1. Consequently, d G (f(x), U) d G (f(z), U) d G (f(x), f(z)) rδ s+1 δ δ s 1 /3 > (r 1)δ s+1, thus, f(x) f s (x). For any x X, z = nn s 1 (x) was precomputed, and hence the bin η s (z) can be found in O(1) time. Using a BFS from the bin η s 1 (z) we can compute f s (x) in O( f s (x) ) = O(δ s ) time. Therefore, the total running time to compute f s (x) for all 0 s < S is O(δ S ) = (δ ) O(1). The running time of the lemma follows because we there are n choices for x. 5.3 Enumerating net views For a U V G, we wish to list a set of net views that contain the span r net restriction of every feasible embedding into U. The following lemma shows how to find this list and bound its size simultaneously. Lemma 5.5. For any U V G, and r 1, there is an algorithm to compute a list of n U (δ ) U (1+log δ r) λ (O(rδ2 )) λ net views that contains the span r net restriction of every feasible embedding into U, in the same asymptotic running time. Proof. We describe an algorithm to find a list of net views that include the span r net restriction of every feasible map f into U. Our algorithm, first guesses the preimage X U of U under f, and the restriction of f to X U, g : X U U. There are n U choices g. Next, for each 0 s < S, our algorithm lists a set of possibilities for η s : X s 1 s. Note that, the partial map η s only maps into scale s bins that intersect a B(u, rδ s+1 ) for a u U. For each u U, let η s [u] be the restriction of η s in its range to the subset of s that intersect B(u, rδ s+1 ). This subset has size (O(rδ)) λ because s belongs to a family of bins of density λ with a constant accuracy. On the other hand, η s [u] can only act on the points of X s 1 that are at distance at most rδ s+1 +δ s /3 (r+1)δ s+1 of g 1 (u), as otherwise any extension of N must be contracting. There are ( O(rδ 3 ) ) λ such points by Lemma 5.2. Since f is non-contracting, Lemma 2.2 implies that at most (O(δ)) λ points of X s 1, have their images in a bin of scale s. Therefore, provided g 1 (u), there are [ (O(rδ 3 ) ) λ ] (O(δ)) λ = (rδ) λ (O(δ))λ choices for the preimage of each bin that intersects B(u, rδ s+1 ). Since, there are (O(rδ)) λ number of such bins, the total number of choices for η s is [(rδ) λ (O(δ))λ] (O(rδ)) λ = (rδ) λ (O(rδ2 )) λ Our algorithm lists a set of possibilities for η s by combining its guesses for η s [u] for all u U. Then, it makes the list for N by combining the lists for η s s for all 0 s < S. Thus, provided g, there are (rδ) λ (O(rδ2 )) λ U S number of choices for N. Since there are n U choices for g, our algorithm outputs a list of size n U (rδ) λ (O(rδ2 )) λ U S = n U (δ ) U (1+log δ r) λ (O(rδ2 )) λ that contains the net restriction of all feasible embeddings. The last equality holds because S = log δ + 1. Now, we are ready to prove the main lemma of this section. Proof. [of Lemma 5.1] By Lemma 5.4, to obtain focused views of span ρ, we need to consider span ρ + 1 net restrictions of feasible embeddings. We use

10 Lemma 5.5 to compute a list of net views into each U i that contains a span ρ + 1 net restriction of every feasible embedding. According to the same lemma, the size of this list is n Ui (δ ) Ui (1+log δ (ρ+1)) λ (O((ρ+1)δ2 )) λ = n Ui (δ ) Ui (1+log δ ρ) λ (O(ρδ2 )) λ and it can be computed in the same asymptotic running time. Each of these net views N induces a unique focused view F of f by Lemma 5.4. Since for any f, U, and span there is a unique net restriction, which in turn induces a unique focused view, any two focused views of the same f computed by our algorithm must be consistent. The total running time to compute the list for each U i is bounded by n α+1 (δ ) α (1+log δ ρ) λ (O(ρδ2 )) λ, as α = max 0 i k U i, and we need n(δ ) O(1) time to extend each of the net views in the list to a focused view. The final running time is as stated in the lemma because we are computing k lists. 6 Merging focused views on a tree decomposition Let s recap. In Section 4, we outlined the goal of finding a complete set of focused views. As previously discussed, to achieve this we choose a collection of centers, define lists of possible focused views over these centers, and then extract a complete set from these lists. For each chosen center, in Section 5 it was shown how to construct such a list whose size is significantly smaller than what would result from brute force enumeration of focused views. What remains is to extract a complete set from these lists. As completeness is a property of an entire collection of focused views, naively we must try all possibilities of selecting one focused view from each center s list, and check whether each resulting set is complete. Fortunately, it just so happens that in Lemma 5.1 we proved our lists have the stronger property of containing a pairwise consistent set, i.e. a set such that satisfying a local condition between each pair, implies completeness for the set. While pairwise consistency is a strong property, it is still unclear how to extract consistent focused views from the lists. This is where tree decomposition comes into play. Let T = (V T, E T ) be a tree decomposition of G. We choose the centers for our focused views to be the sets in V T. The crucial property of the tree decomposition is that to check for consistency between all pairs of a collection of focused views, it suffices to check for consistency between the pairs determined by E T, and this property allows us to find a consistent set from the lists using dynamic programming over T. Note that this is the only place where we use the tree decomposition, and moreover Lemma 5.1 relates the running time to the size of the bags in V T. Lemma 6.3 proves the above described crucial property, and to this end we have the following helper lemmas. Lemma 6.1. Let T = (V T, E T ) be a tree decomposition of G, and let B V T. Let T 1,..., T t be the connected components of T \B, and let C be a connected component of G\B. We have that C intersects bags of exactly one of the T i s. Proof. Suppose, to derive a contradiction, there are u, u C such that u B T i, and u B T j, for 1 i < j t. Let γ be a u-to-u path in C, and note that γ B =. Therefore, for each v γ there is a unique 1 i t such that v T i. Since, u and u belong to bags of different connected component of T \B, there is an edge (v, v ) γ, such that v T l and v T k for some 1 l < k t. Since T is a tree decomposition it must have a bag B that contains both v and v. Moreover, since v and v belong to different connected components of T \B, and since v, v / B, it follows that B cannot belong to any T i. Lemma 6.2. Let (B, B ) E T, and let F and F be consistent focused views at B and B, respectively. Let T B be the connected component of T \B that contains B, and let U be the set of all vertices in the bags of T B. For any x X, and 0 s < S, if x is visible under F and not under F at scale s then f s(x) U, and f s(x) B =. Proof. The consistency of F and F implies that f s(x) does not intersect B(B, ρδ s+1 ), and, in particular, f s(x) B =. Suppose, to derive a contradiction, that there is u f s(x), u / U. If there exists v f s(x) U, by Lemma 6.1 any u-to-v path must intersect B. As f s(x) is connected, there is a u-to-v path contained in f s(x), but we know that f s(x) B =, thus, f s(x) U =. Therefore, any path from f s(x) to B in G intersects B, in particular, d G (f s(x), B) d G (f s(x), B ) ρδ s+1. Thus, the consistency of F and F implies that f s(x) intersects B(B, ρδ s+1 ), which is contradictory. Lemma 6.3. Let (B, B ), (B, B ) E T. Let F, F, and F be plausible focused views at B, B and B, respectively. If F and F are consistent, and F and F are consistent, then F and F are consistent.

11 Proof. For any x X and any 0 s < S, we show that the conditions of consistency for F and F hold. Let T B and T B be the connected components of T \B that contain B and B, respectively. Let U and U be the set of all vertices in the bags of T B and T B, respectively. If x is invisible under both F and F at scale s then no condition is imposed by consistency. So, assume x is visible under at least one of them, and without loss of generality, suppose that is F. If x is visible at scale s under F then the consistency of F with F implies that f s (x) = f s(x), thus, the consistency of F and F, implies our desired condition for x and s. So, suppose that x is visible under F but not under F at scale s. There are two cases to consider, either x is visible at scale s under F or not. First, suppose that x is visible under F. By Lemma 6.2, since F and F are consistent f s (x) U, and since F and F are consistent f s (x) U. Let a > s be the smallest scale at which x is visible under F. Note that f a(x) does not intersect B, as x is not visible at scale a 1 under F. Also, by Lemma 4.1, x is visible at scale a, under both F and F. Therefore, let A = f a (x) = f a(x) = f a (x). Since F and F are plausible, A intersects both f s (x) and f s (x). But, this is not possible as f s (x) and f s (x) are in different connected components of G\B, and A does not intersect B, yet A is connected. Second, suppose that x is not visible under F at scale s. Since x is visible under F and not under F at scale s, Lemma 6.2 implies that f s (x) U. Also, as F and F are consistent, f s (x) does not intersect B(B, ρδ s+1 ), that is d G (f s (x), B ) > ρδ s+1. Additionally, d G (f s (x), B ) d G (f s (x), B ) because f s (x) is in U, so any path from f s (x) to B intersects B by Lemma 6.1. Therefore, d G (f s (x), B ) > ρδ s+1, so f s (x) does not intersect B(B, ρδ s+1 ) as required for consistency. The following corollary that immediately follows from Lemma 6.3 and Lemma 4.6 facilitates the computation of a complete set of focused views from the lists of Lemma 5.1. Corollary 6.1. Let T = (V T, E T ) be a tree decomposition of G, and let F be a collection of focused views at bags of T. If the focused views of T into any adjacent pair of bags are consistent then F is a complete set of focused views. 6.1 The Algorithm, Proof of Theorem 1.1 We describe a dynamic programming procedure to extract a complete set of focused views at bags of T from the lists computed by Lemma 5.1. The key requirement of our dynamic programming is Corollary 6.1, that the consistency of focused views at adjacent bags implies completeness. Pick an arbitrary vertex R of T to be the root, in order to define the notions of subtrees and ancestry. Let B T, and let T B denote the subtree of T with root B. Let F B be a set of focused views at the bags of T B, which contains exactly one view at each bag of T B. We say that F B is consistent if the focused views at every pair of adjacent bags in T B are consistent. We say that a focused view F at B is an end view at B if there is a consistent set of focused views at T B that contains F. The goal of our dynamic programming procedure is to find an end view at R. Lemma 6.4. Suppose, a tree decomposition T of G with treewidth ω is provided. For any ɛ > 0, and δ > 1 (note both strict inequalities), there is a n O(ω ) (δ ) ω (1+log δ ρ) λ O((ρδ 2 )) λ time algorithm to compute a (1 + ɛ)δ embedding of X into V G if δ δ opt, where ρ = 1/(δ 1) + 2/ɛ + 5 (provided V G = (δ ) O(λ) ). If δ < δ opt, this algorithm either computes an embedding of distortion (1 + ɛ)δ, or (correctly) decides that δ < δ opt. Proof. Our algorithm computes a list of focused views L B at every B V T by Lemma 5.1, and trims implausible views in L B using the algorithm of Lemma 4.2, in the following total running time. (n O(ω ) (δ ) ω (1+log δ ρ) λ O((ρδ 2 )) λ ) (n O(1) (δ ) O(λ)) = n O(ω ) (δ ) ω (1+log δ ρ) λ O((ρδ 2 )) λ Starting from the leaves, our algorithm computes all end views at every bag of T iteratively. Any plausible focused view at a leaf is an end view, so there is nothing to do at leaves. Now, let B be a non-leaf bag and suppose that all end views in the lists of all of its children are computed. Our algorithm considers all plausible maps in L B one by one, and keeps each F L B only if for every child B of B there is an F L B that is consistent with F. Otherwise, it removes F from L B. To this end, our algorithm tests consistency between every F L B and every F L B using Lemma 4.5. The total running time for trimming L B to keep only

12 the end views is thus, (n O(ω ) (δ ) ω (1+log δ ρ) λ O((ρδ 2 )) λ ) 2 (n O(1) (δ ) O(λ)) = n O(ω ) (δ ) ω (1+log δ ρ) λ O((ρδ 2 )) λ The time to compute all lists of end views is asymptotically the same. In the end, we pick any end view at R and trace back T to output a set of focused views F that are pairwise consistent over the edges of T. Thus, F is a complete set of focused views by Corollary 6.1, so h F, defined in Equation (4.1), is an embedding of distortion (ρ + 1)δ/(ρ 1) by Lemma 4.4. To obtain our approximation requirement we set ρ = 1/(δ 1) + 2/ɛ + 5 max(1/(δ 1), 4, 2/ɛ + 1) (recall that ρ max(1/(δ 1), 4) is already required from the definition of focused views). Therefore, the final running time is as in the statement of the lemma. Proof. [of Theorem 1.1] Our algorithm first computes a tree decomposition T of G of width O(ω) via the algorithm of Lemma 2.1 in m 2 O(ω) time. By Lemma 2.3, there is a list L of (nm) O(1) numbers that contain δ opt and that can be computed in (nm) O(1) time. For each β L, in increasing order, and for each v V G, we call the algorithm of Lemma 6.4, with parameters T, δ = β + ε/2 and ɛ = ε/3, to check if an embedding of distortion close to β from X into B(v, 4β ) exists. By Lemma 2.4, if X can embed into G with distortion at most β then it can embed into B(v, 4β ) for some v V G with the same distortion. As β 1 and ε > 0, we have δ > 1 and ɛ > 0. The algorithm of Lemma 6.4 outputs an embedding with distortion (1 + ε/3)(β + ε/2) (1 + ε)β, if β δ opt, otherwise, it either outputs an embedding of distortion (1 + ε)β, or it decides that β < δ opt. We stop, and return the embedding, as soon as we obtain one. The running time of each call to this algorithm is bounded by (6.7) Note that, n O(ω) (δ ) ω (1+log δ ρ) λ O((ρδ2 )) λ ρ = 1/(δ 1) + 2/ɛ + 5 = 1/(β + ε/2 1) + 2/(ε/3) + 5 8/ε + 5 = O(1/ε). Substituting δ, ɛ and ρ in (6.7), we find the new bound (6.8)n O(ω) (δ ) ω (1+log β+ε/2 1/ε) λ O((β2 /ε)) λ We bound log β+ε/2 (1/ε). As β 1 and ε > 0, we have log β+ε/2 (1/ε) = log(1/ε) log(β + ε/2) 1/ε log(1 + ε/2). We know (via Taylor expansion, and because ε > 0) that log(1 + ε/2) (ε/2)/(1 + ε/2). Therefore, log β+ε/2 (1/ε) 1/ε ε/(2 + ε) 3 ε 2. Replacing in (6.8), we conclude that the running time of one call to the algorithm of Lemma 6.4 is bounded by n O(ω) (δ ) ω (1/ε2 ) λ O((β 2 /ε)) λ So, the total running time for computing L, and for calls of the algorithm of Lemma 6.4 for all β δ opt in L is bounded by (nm) O(1) + m n O(ω) (δ opt ) ω (1/ε)λ+2 λ (O(δ opt)) 2λ References [Ass83] Patrice Assouad. Plongements lipschitziens dans R n. Bull. Soc. Math. France, 11(4): , [Bar96] Yair Bartal. Probabilistic approximation of metric spaces and its algorithmic applications. In Proceedings of the 37th Annual Symposium on Foundations of Computer Science, FOCS 96, pages 184, Washington, DC, USA, IEEE Computer Society. [BCIS05] Mihai Badoiu, Julia Chuzhoy, Piotr Indyk, and Anastasios Sidiropoulos. Low-distortion embeddings of general metrics into the line. In Proceedings of the 37th Annual ACM Symposium on Theory of Computing, STOC 05, pages ACM, [BDD + 13] Hans L. Bodlaender, Pål Grønås Drange, Markus S. Dregi, Fedor V. Fomin, Daniel Lokshtanov, and Michal Pilipczuk. An O(c k n) 5- approximation algorithm for treewidth. In Proceedings of the 2013 IEEE 54th Annual Symposium on Foundations of Computer Science, FOCS 13, pages , Washington, DC, USA, IEEE Computer Society. [BDG + 05] Mihai Badoiu, Kedar Dhamdhere, Anupam Gupta, Yuri Rabinovich, Harald Räcke, R. Ravi, and Anastasios Sidiropoulos. Approximation algorithms for low-distortion embeddings into lowdimensional spaces. In Proceedings of the Sixteenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 05, pages , Philadelphia, PA, USA, Society for Industrial and Applied Mathematics.

Tree-width and algorithms

Tree-width and algorithms Tree-width and algorithms Zdeněk Dvořák September 14, 2015 1 Algorithmic applications of tree-width Many problems that are hard in general become easy on trees. For example, consider the problem of finding

More information

Hardness of Embedding Metric Spaces of Equal Size

Hardness of Embedding Metric Spaces of Equal Size Hardness of Embedding Metric Spaces of Equal Size Subhash Khot and Rishi Saket Georgia Institute of Technology {khot,saket}@cc.gatech.edu Abstract. We study the problem embedding an n-point metric space

More information

Lecture 18: March 15

Lecture 18: March 15 CS71 Randomness & Computation Spring 018 Instructor: Alistair Sinclair Lecture 18: March 15 Disclaimer: These notes have not been subjected to the usual scrutiny accorded to formal publications. They may

More information

Cographs; chordal graphs and tree decompositions

Cographs; chordal graphs and tree decompositions Cographs; chordal graphs and tree decompositions Zdeněk Dvořák September 14, 2015 Let us now proceed with some more interesting graph classes closed on induced subgraphs. 1 Cographs The class of cographs

More information

On Stochastic Decompositions of Metric Spaces

On Stochastic Decompositions of Metric Spaces On Stochastic Decompositions of Metric Spaces Scribe of a talk given at the fall school Metric Embeddings : Constructions and Obstructions. 3-7 November 204, Paris, France Ofer Neiman Abstract In this

More information

Partitioning Metric Spaces

Partitioning Metric Spaces Partitioning Metric Spaces Computational and Metric Geometry Instructor: Yury Makarychev 1 Multiway Cut Problem 1.1 Preliminaries Definition 1.1. We are given a graph G = (V, E) and a set of terminals

More information

Finite Metric Spaces & Their Embeddings: Introduction and Basic Tools

Finite Metric Spaces & Their Embeddings: Introduction and Basic Tools Finite Metric Spaces & Their Embeddings: Introduction and Basic Tools Manor Mendel, CMI, Caltech 1 Finite Metric Spaces Definition of (semi) metric. (M, ρ): M a (finite) set of points. ρ a distance function

More information

Metric Spaces and Topology

Metric Spaces and Topology Chapter 2 Metric Spaces and Topology From an engineering perspective, the most important way to construct a topology on a set is to define the topology in terms of a metric on the set. This approach underlies

More information

Ordinal Embedding: Approximation Algorithms and Dimensionality Reduction

Ordinal Embedding: Approximation Algorithms and Dimensionality Reduction Ordinal Embedding: Approximation Algorithms and Dimensionality Reduction Mihai Bădoiu 1, Erik D. Demaine 2, MohammadTaghi Hajiaghayi 3, Anastasios Sidiropoulos 2, and Morteza Zadimoghaddam 4 1 Google Inc.,

More information

An Improved Approximation Algorithm for Requirement Cut

An Improved Approximation Algorithm for Requirement Cut An Improved Approximation Algorithm for Requirement Cut Anupam Gupta Viswanath Nagarajan R. Ravi Abstract This note presents improved approximation guarantees for the requirement cut problem: given an

More information

Small distortion and volume preserving embedding for Planar and Euclidian metrics Satish Rao

Small distortion and volume preserving embedding for Planar and Euclidian metrics Satish Rao Small distortion and volume preserving embedding for Planar and Euclidian metrics Satish Rao presented by Fjóla Rún Björnsdóttir CSE 254 - Metric Embeddings Winter 2007 CSE 254 - Metric Embeddings - Winter

More information

On improving matchings in trees, via bounded-length augmentations 1

On improving matchings in trees, via bounded-length augmentations 1 On improving matchings in trees, via bounded-length augmentations 1 Julien Bensmail a, Valentin Garnero a, Nicolas Nisse a a Université Côte d Azur, CNRS, Inria, I3S, France Abstract Due to a classical

More information

Connectedness. Proposition 2.2. The following are equivalent for a topological space (X, T ).

Connectedness. Proposition 2.2. The following are equivalent for a topological space (X, T ). Connectedness 1 Motivation Connectedness is the sort of topological property that students love. Its definition is intuitive and easy to understand, and it is a powerful tool in proofs of well-known results.

More information

25 Minimum bandwidth: Approximation via volume respecting embeddings

25 Minimum bandwidth: Approximation via volume respecting embeddings 25 Minimum bandwidth: Approximation via volume respecting embeddings We continue the study of Volume respecting embeddings. In the last lecture, we motivated the use of volume respecting embeddings by

More information

Tree-width. September 14, 2015

Tree-width. September 14, 2015 Tree-width Zdeněk Dvořák September 14, 2015 A tree decomposition of a graph G is a pair (T, β), where β : V (T ) 2 V (G) assigns a bag β(n) to each vertex of T, such that for every v V (G), there exists

More information

ON ASSOUAD S EMBEDDING TECHNIQUE

ON ASSOUAD S EMBEDDING TECHNIQUE ON ASSOUAD S EMBEDDING TECHNIQUE MICHAL KRAUS Abstract. We survey the standard proof of a theorem of Assouad stating that every snowflaked version of a doubling metric space admits a bi-lipschitz embedding

More information

arxiv: v1 [cs.ds] 2 Oct 2018

arxiv: v1 [cs.ds] 2 Oct 2018 Contracting to a Longest Path in H-Free Graphs Walter Kern 1 and Daniël Paulusma 2 1 Department of Applied Mathematics, University of Twente, The Netherlands w.kern@twente.nl 2 Department of Computer Science,

More information

Packing and decomposition of graphs with trees

Packing and decomposition of graphs with trees Packing and decomposition of graphs with trees Raphael Yuster Department of Mathematics University of Haifa-ORANIM Tivon 36006, Israel. e-mail: raphy@math.tau.ac.il Abstract Let H be a tree on h 2 vertices.

More information

Fixed Parameter Algorithms for Interval Vertex Deletion and Interval Completion Problems

Fixed Parameter Algorithms for Interval Vertex Deletion and Interval Completion Problems Fixed Parameter Algorithms for Interval Vertex Deletion and Interval Completion Problems Arash Rafiey Department of Informatics, University of Bergen, Norway arash.rafiey@ii.uib.no Abstract We consider

More information

On the Distortion of Embedding Perfect Binary Trees into Low-dimensional Euclidean Spaces

On the Distortion of Embedding Perfect Binary Trees into Low-dimensional Euclidean Spaces On the Distortion of Embedding Perfect Binary Trees into Low-dimensional Euclidean Spaces Dona-Maria Ivanova under the direction of Mr. Zhenkun Li Department of Mathematics Massachusetts Institute of Technology

More information

The Strong Largeur d Arborescence

The Strong Largeur d Arborescence The Strong Largeur d Arborescence Rik Steenkamp (5887321) November 12, 2013 Master Thesis Supervisor: prof.dr. Monique Laurent Local Supervisor: prof.dr. Alexander Schrijver KdV Institute for Mathematics

More information

Dynamic Programming on Trees. Example: Independent Set on T = (V, E) rooted at r V.

Dynamic Programming on Trees. Example: Independent Set on T = (V, E) rooted at r V. Dynamic Programming on Trees Example: Independent Set on T = (V, E) rooted at r V. For v V let T v denote the subtree rooted at v. Let f + (v) be the size of a maximum independent set for T v that contains

More information

Packing and Covering Dense Graphs

Packing and Covering Dense Graphs Packing and Covering Dense Graphs Noga Alon Yair Caro Raphael Yuster Abstract Let d be a positive integer. A graph G is called d-divisible if d divides the degree of each vertex of G. G is called nowhere

More information

AN EXPLORATION OF THE METRIZABILITY OF TOPOLOGICAL SPACES

AN EXPLORATION OF THE METRIZABILITY OF TOPOLOGICAL SPACES AN EXPLORATION OF THE METRIZABILITY OF TOPOLOGICAL SPACES DUSTIN HEDMARK Abstract. A study of the conditions under which a topological space is metrizable, concluding with a proof of the Nagata Smirnov

More information

Tree-width and planar minors

Tree-width and planar minors Tree-width and planar minors Alexander Leaf and Paul Seymour 1 Princeton University, Princeton, NJ 08544 May 22, 2012; revised March 18, 2014 1 Supported by ONR grant N00014-10-1-0680 and NSF grant DMS-0901075.

More information

Partial cubes: structures, characterizations, and constructions

Partial cubes: structures, characterizations, and constructions Partial cubes: structures, characterizations, and constructions Sergei Ovchinnikov San Francisco State University, Mathematics Department, 1600 Holloway Ave., San Francisco, CA 94132 Abstract Partial cubes

More information

On-line embeddings. Piotr Indyk Avner Magen Anastasios Sidiropoulos Anastasios Zouzias

On-line embeddings. Piotr Indyk Avner Magen Anastasios Sidiropoulos Anastasios Zouzias On-line embeddings Piotr Indyk Avner Magen Anastasios Sidiropoulos Anastasios Zouzias Abstract We initiate the study of on-line metric embeddings. In such an embedding we are given a sequence of n points

More information

A PTAS for TSP with Fat Weakly Disjoint Neighborhoods in Doubling Metrics

A PTAS for TSP with Fat Weakly Disjoint Neighborhoods in Doubling Metrics A PTAS for TSP with Fat Weakly Disjoint Neighborhoods in Doubling Metrics T-H. Hubert Chan Shaofeng H.-C. Jiang Abstract We consider the Traveling Salesman Problem with Neighborhoods (TSPN) in doubling

More information

16 Embeddings of the Euclidean metric

16 Embeddings of the Euclidean metric 16 Embeddings of the Euclidean metric In today s lecture, we will consider how well we can embed n points in the Euclidean metric (l 2 ) into other l p metrics. More formally, we ask the following question.

More information

Topological properties

Topological properties CHAPTER 4 Topological properties 1. Connectedness Definitions and examples Basic properties Connected components Connected versus path connected, again 2. Compactness Definition and first examples Topological

More information

Inapproximability for planar embedding problems

Inapproximability for planar embedding problems Inapproximability for planar embedding problems Jeff Edmonds 1 Anastasios Sidiropoulos 2 Anastasios Zouzias 3 1 York University 2 TTI-Chicago 3 University of Toronto January, 2010 A. Zouzias (University

More information

Course 212: Academic Year Section 1: Metric Spaces

Course 212: Academic Year Section 1: Metric Spaces Course 212: Academic Year 1991-2 Section 1: Metric Spaces D. R. Wilkins Contents 1 Metric Spaces 3 1.1 Distance Functions and Metric Spaces............. 3 1.2 Convergence and Continuity in Metric Spaces.........

More information

CHAPTER 9. Embedding theorems

CHAPTER 9. Embedding theorems CHAPTER 9 Embedding theorems In this chapter we will describe a general method for attacking embedding problems. We will establish several results but, as the main final result, we state here the following:

More information

Algorithms, Geometry and Learning. Reading group Paris Syminelakis

Algorithms, Geometry and Learning. Reading group Paris Syminelakis Algorithms, Geometry and Learning Reading group Paris Syminelakis October 11, 2016 2 Contents 1 Local Dimensionality Reduction 5 1 Introduction.................................... 5 2 Definitions and Results..............................

More information

CHAPTER 7. Connectedness

CHAPTER 7. Connectedness CHAPTER 7 Connectedness 7.1. Connected topological spaces Definition 7.1. A topological space (X, T X ) is said to be connected if there is no continuous surjection f : X {0, 1} where the two point set

More information

Filters in Analysis and Topology

Filters in Analysis and Topology Filters in Analysis and Topology David MacIver July 1, 2004 Abstract The study of filters is a very natural way to talk about convergence in an arbitrary topological space, and carries over nicely into

More information

Basic counting techniques. Periklis A. Papakonstantinou Rutgers Business School

Basic counting techniques. Periklis A. Papakonstantinou Rutgers Business School Basic counting techniques Periklis A. Papakonstantinou Rutgers Business School i LECTURE NOTES IN Elementary counting methods Periklis A. Papakonstantinou MSIS, Rutgers Business School ALL RIGHTS RESERVED

More information

Math 541 Fall 2008 Connectivity Transition from Math 453/503 to Math 541 Ross E. Staffeldt-August 2008

Math 541 Fall 2008 Connectivity Transition from Math 453/503 to Math 541 Ross E. Staffeldt-August 2008 Math 541 Fall 2008 Connectivity Transition from Math 453/503 to Math 541 Ross E. Staffeldt-August 2008 Closed sets We have been operating at a fundamental level at which a topological space is a set together

More information

k-protected VERTICES IN BINARY SEARCH TREES

k-protected VERTICES IN BINARY SEARCH TREES k-protected VERTICES IN BINARY SEARCH TREES MIKLÓS BÓNA Abstract. We show that for every k, the probability that a randomly selected vertex of a random binary search tree on n nodes is at distance k from

More information

An Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees

An Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees An Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees Francesc Rosselló 1, Gabriel Valiente 2 1 Department of Mathematics and Computer Science, Research Institute

More information

On the hardness of losing width

On the hardness of losing width On the hardness of losing width Marek Cygan 1, Daniel Lokshtanov 2, Marcin Pilipczuk 1, Micha l Pilipczuk 1, and Saket Saurabh 3 1 Institute of Informatics, University of Warsaw, Poland {cygan@,malcin@,mp248287@students}mimuwedupl

More information

A Separator Theorem for Graphs with an Excluded Minor and its Applications

A Separator Theorem for Graphs with an Excluded Minor and its Applications A Separator Theorem for Graphs with an Excluded Minor and its Applications Noga Alon IBM Almaden Research Center, San Jose, CA 95120,USA and Sackler Faculty of Exact Sciences, Tel Aviv University, Tel

More information

The Computational Complexity of Graph Contractions I: Polynomially Solvable and NP-Complete Cases*

The Computational Complexity of Graph Contractions I: Polynomially Solvable and NP-Complete Cases* The Computational Complexity of Graph Contractions I: Polynomially Solvable and NP-Complete Cases* Asaf Levin Department of Statistics, The Hebrew University, Jerusalem 91905, Israel Daniel Paulusma Department

More information

Multivalued functions in digital topology

Multivalued functions in digital topology Note di Matematica ISSN 1123-2536, e-issn 1590-0932 Note Mat. 37 (2017) no. 2, 61 76. doi:10.1285/i15900932v37n2p61 Multivalued functions in digital topology Laurence Boxer Department of Computer and Information

More information

Three-coloring triangle-free graphs on surfaces VII. A linear-time algorithm

Three-coloring triangle-free graphs on surfaces VII. A linear-time algorithm Three-coloring triangle-free graphs on surfaces VII. A linear-time algorithm Zdeněk Dvořák Daniel Král Robin Thomas Abstract We give a linear-time algorithm to decide 3-colorability of a trianglefree graph

More information

Testing Equality in Communication Graphs

Testing Equality in Communication Graphs Electronic Colloquium on Computational Complexity, Report No. 86 (2016) Testing Equality in Communication Graphs Noga Alon Klim Efremenko Benny Sudakov Abstract Let G = (V, E) be a connected undirected

More information

Part V. 17 Introduction: What are measures and why measurable sets. Lebesgue Integration Theory

Part V. 17 Introduction: What are measures and why measurable sets. Lebesgue Integration Theory Part V 7 Introduction: What are measures and why measurable sets Lebesgue Integration Theory Definition 7. (Preliminary). A measure on a set is a function :2 [ ] such that. () = 2. If { } = is a finite

More information

On metric characterizations of some classes of Banach spaces

On metric characterizations of some classes of Banach spaces On metric characterizations of some classes of Banach spaces Mikhail I. Ostrovskii January 12, 2011 Abstract. The first part of the paper is devoted to metric characterizations of Banach spaces with no

More information

Learning convex bodies is hard

Learning convex bodies is hard Learning convex bodies is hard Navin Goyal Microsoft Research India navingo@microsoft.com Luis Rademacher Georgia Tech lrademac@cc.gatech.edu Abstract We show that learning a convex body in R d, given

More information

Augmenting Outerplanar Graphs to Meet Diameter Requirements

Augmenting Outerplanar Graphs to Meet Diameter Requirements Proceedings of the Eighteenth Computing: The Australasian Theory Symposium (CATS 2012), Melbourne, Australia Augmenting Outerplanar Graphs to Meet Diameter Requirements Toshimasa Ishii Department of Information

More information

Lebesgue Measure on R n

Lebesgue Measure on R n CHAPTER 2 Lebesgue Measure on R n Our goal is to construct a notion of the volume, or Lebesgue measure, of rather general subsets of R n that reduces to the usual volume of elementary geometrical sets

More information

arxiv: v1 [math.co] 28 Oct 2016

arxiv: v1 [math.co] 28 Oct 2016 More on foxes arxiv:1610.09093v1 [math.co] 8 Oct 016 Matthias Kriesell Abstract Jens M. Schmidt An edge in a k-connected graph G is called k-contractible if the graph G/e obtained from G by contracting

More information

The Lefthanded Local Lemma characterizes chordal dependency graphs

The Lefthanded Local Lemma characterizes chordal dependency graphs The Lefthanded Local Lemma characterizes chordal dependency graphs Wesley Pegden March 30, 2012 Abstract Shearer gave a general theorem characterizing the family L of dependency graphs labeled with probabilities

More information

MAT 570 REAL ANALYSIS LECTURE NOTES. Contents. 1. Sets Functions Countability Axiom of choice Equivalence relations 9

MAT 570 REAL ANALYSIS LECTURE NOTES. Contents. 1. Sets Functions Countability Axiom of choice Equivalence relations 9 MAT 570 REAL ANALYSIS LECTURE NOTES PROFESSOR: JOHN QUIGG SEMESTER: FALL 204 Contents. Sets 2 2. Functions 5 3. Countability 7 4. Axiom of choice 8 5. Equivalence relations 9 6. Real numbers 9 7. Extended

More information

Bin packing with colocations

Bin packing with colocations Bin packing with colocations Jean-Claude Bermond 1, Nathann Cohen, David Coudert 1, Dimitrios Letsios 1, Ioannis Milis 3, Stéphane Pérennes 1, and Vassilis Zissimopoulos 4 1 Université Côte d Azur, INRIA,

More information

1 The Local-to-Global Lemma

1 The Local-to-Global Lemma Point-Set Topology Connectedness: Lecture 2 1 The Local-to-Global Lemma In the world of advanced mathematics, we are often interested in comparing the local properties of a space to its global properties.

More information

Even Pairs and Prism Corners in Square-Free Berge Graphs

Even Pairs and Prism Corners in Square-Free Berge Graphs Even Pairs and Prism Corners in Square-Free Berge Graphs Maria Chudnovsky Princeton University, Princeton, NJ 08544 Frédéric Maffray CNRS, Laboratoire G-SCOP, University of Grenoble-Alpes, France Paul

More information

5 Set Operations, Functions, and Counting

5 Set Operations, Functions, and Counting 5 Set Operations, Functions, and Counting Let N denote the positive integers, N 0 := N {0} be the non-negative integers and Z = N 0 ( N) the positive and negative integers including 0, Q the rational numbers,

More information

4 Countability axioms

4 Countability axioms 4 COUNTABILITY AXIOMS 4 Countability axioms Definition 4.1. Let X be a topological space X is said to be first countable if for any x X, there is a countable basis for the neighborhoods of x. X is said

More information

Minimum-Dilation Tour (and Path) is NP-hard

Minimum-Dilation Tour (and Path) is NP-hard Minimum-Dilation Tour (and Path) is NP-hard Panos Giannopoulos Christian Knauer Dániel Marx Abstract We prove that computing a minimum-dilation (Euclidean) Hamilton circuit or path on a given set of points

More information

A necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees

A necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees A necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees Yoshimi Egawa Department of Mathematical Information Science, Tokyo University of

More information

Asymptotically optimal induced universal graphs

Asymptotically optimal induced universal graphs Asymptotically optimal induced universal graphs Noga Alon Abstract We prove that the minimum number of vertices of a graph that contains every graph on vertices as an induced subgraph is (1 + o(1))2 (

More information

X. Numerical Methods

X. Numerical Methods X. Numerical Methods. Taylor Approximation Suppose that f is a function defined in a neighborhood of a point c, and suppose that f has derivatives of all orders near c. In section 5 of chapter 9 we introduced

More information

Some Background Material

Some Background Material Chapter 1 Some Background Material In the first chapter, we present a quick review of elementary - but important - material as a way of dipping our toes in the water. This chapter also introduces important

More information

arxiv: v1 [cs.dm] 26 Apr 2010

arxiv: v1 [cs.dm] 26 Apr 2010 A Simple Polynomial Algorithm for the Longest Path Problem on Cocomparability Graphs George B. Mertzios Derek G. Corneil arxiv:1004.4560v1 [cs.dm] 26 Apr 2010 Abstract Given a graph G, the longest path

More information

Efficient Approximation for Restricted Biclique Cover Problems

Efficient Approximation for Restricted Biclique Cover Problems algorithms Article Efficient Approximation for Restricted Biclique Cover Problems Alessandro Epasto 1, *, and Eli Upfal 2 ID 1 Google Research, New York, NY 10011, USA 2 Department of Computer Science,

More information

arxiv: v1 [math.co] 13 Dec 2014

arxiv: v1 [math.co] 13 Dec 2014 SEARCHING FOR KNIGHTS AND SPIES: A MAJORITY/MINORITY GAME MARK WILDON arxiv:1412.4247v1 [math.co] 13 Dec 2014 Abstract. There are n people, each of whom is either a knight or a spy. It is known that at

More information

4 CONNECTED PROJECTIVE-PLANAR GRAPHS ARE HAMILTONIAN. Robin Thomas* Xingxing Yu**

4 CONNECTED PROJECTIVE-PLANAR GRAPHS ARE HAMILTONIAN. Robin Thomas* Xingxing Yu** 4 CONNECTED PROJECTIVE-PLANAR GRAPHS ARE HAMILTONIAN Robin Thomas* Xingxing Yu** School of Mathematics Georgia Institute of Technology Atlanta, Georgia 30332, USA May 1991, revised 23 October 1993. Published

More information

arxiv: v1 [math.co] 23 Feb 2015

arxiv: v1 [math.co] 23 Feb 2015 Catching a mouse on a tree Vytautas Gruslys Arès Méroueh arxiv:1502.06591v1 [math.co] 23 Feb 2015 February 24, 2015 Abstract In this paper we consider a pursuit-evasion game on a graph. A team of cats,

More information

Sergey Norin Department of Mathematics and Statistics McGill University Montreal, Quebec H3A 2K6, Canada. and

Sergey Norin Department of Mathematics and Statistics McGill University Montreal, Quebec H3A 2K6, Canada. and NON-PLANAR EXTENSIONS OF SUBDIVISIONS OF PLANAR GRAPHS Sergey Norin Department of Mathematics and Statistics McGill University Montreal, Quebec H3A 2K6, Canada and Robin Thomas 1 School of Mathematics

More information

Axioms of separation

Axioms of separation Axioms of separation These notes discuss the same topic as Sections 31, 32, 33, 34, 35, and also 7, 10 of Munkres book. Some notions (hereditarily normal, perfectly normal, collectionwise normal, monotonically

More information

Shortest paths with negative lengths

Shortest paths with negative lengths Chapter 8 Shortest paths with negative lengths In this chapter we give a linear-space, nearly linear-time algorithm that, given a directed planar graph G with real positive and negative lengths, but no

More information

SETS AND FUNCTIONS JOSHUA BALLEW

SETS AND FUNCTIONS JOSHUA BALLEW SETS AND FUNCTIONS JOSHUA BALLEW 1. Sets As a review, we begin by considering a naive look at set theory. For our purposes, we define a set as a collection of objects. Except for certain sets like N, Z,

More information

Foundations of Mathematics MATH 220 FALL 2017 Lecture Notes

Foundations of Mathematics MATH 220 FALL 2017 Lecture Notes Foundations of Mathematics MATH 220 FALL 2017 Lecture Notes These notes form a brief summary of what has been covered during the lectures. All the definitions must be memorized and understood. Statements

More information

Optimization and approximation on systems of geometric objects van Leeuwen, E.J.

Optimization and approximation on systems of geometric objects van Leeuwen, E.J. UvA-DARE (Digital Academic Repository) Optimization and approximation on systems of geometric objects van Leeuwen, E.J. Link to publication Citation for published version (APA): van Leeuwen, E. J. (2009).

More information

Asymptotically optimal induced universal graphs

Asymptotically optimal induced universal graphs Asymptotically optimal induced universal graphs Noga Alon Abstract We prove that the minimum number of vertices of a graph that contains every graph on vertices as an induced subgraph is (1+o(1))2 ( 1)/2.

More information

Austin Mohr Math 730 Homework. f(x) = y for some x λ Λ

Austin Mohr Math 730 Homework. f(x) = y for some x λ Λ Austin Mohr Math 730 Homework In the following problems, let Λ be an indexing set and let A and B λ for λ Λ be arbitrary sets. Problem 1B1 ( ) Show A B λ = (A B λ ). λ Λ λ Λ Proof. ( ) x A B λ λ Λ x A

More information

A Fixed-Parameter Algorithm for Max Edge Domination

A Fixed-Parameter Algorithm for Max Edge Domination A Fixed-Parameter Algorithm for Max Edge Domination Tesshu Hanaka and Hirotaka Ono Department of Economic Engineering, Kyushu University, Fukuoka 812-8581, Japan ono@cscekyushu-uacjp Abstract In a graph,

More information

Connectivity and tree structure in finite graphs arxiv: v5 [math.co] 1 Sep 2014

Connectivity and tree structure in finite graphs arxiv: v5 [math.co] 1 Sep 2014 Connectivity and tree structure in finite graphs arxiv:1105.1611v5 [math.co] 1 Sep 2014 J. Carmesin R. Diestel F. Hundertmark M. Stein 20 March, 2013 Abstract Considering systems of separations in a graph

More information

Topology, Math 581, Fall 2017 last updated: November 24, Topology 1, Math 581, Fall 2017: Notes and homework Krzysztof Chris Ciesielski

Topology, Math 581, Fall 2017 last updated: November 24, Topology 1, Math 581, Fall 2017: Notes and homework Krzysztof Chris Ciesielski Topology, Math 581, Fall 2017 last updated: November 24, 2017 1 Topology 1, Math 581, Fall 2017: Notes and homework Krzysztof Chris Ciesielski Class of August 17: Course and syllabus overview. Topology

More information

A CONSTANT-FACTOR APPROXIMATION FOR MULTI-COVERING WITH DISKS

A CONSTANT-FACTOR APPROXIMATION FOR MULTI-COVERING WITH DISKS A CONSTANT-FACTOR APPROXIMATION FOR MULTI-COVERING WITH DISKS Santanu Bhowmick, Kasturi Varadarajan, and Shi-Ke Xue Abstract. We consider the following multi-covering problem with disks. We are given two

More information

Speeding up the Dreyfus-Wagner Algorithm for minimum Steiner trees

Speeding up the Dreyfus-Wagner Algorithm for minimum Steiner trees Speeding up the Dreyfus-Wagner Algorithm for minimum Steiner trees Bernhard Fuchs Center for Applied Computer Science Cologne (ZAIK) University of Cologne, Weyertal 80, 50931 Köln, Germany Walter Kern

More information

Similarity searching, or how to find your neighbors efficiently

Similarity searching, or how to find your neighbors efficiently Similarity searching, or how to find your neighbors efficiently Robert Krauthgamer Weizmann Institute of Science CS Research Day for Prospective Students May 1, 2009 Background Geometric spaces and techniques

More information

POL502: Foundations. Kosuke Imai Department of Politics, Princeton University. October 10, 2005

POL502: Foundations. Kosuke Imai Department of Politics, Princeton University. October 10, 2005 POL502: Foundations Kosuke Imai Department of Politics, Princeton University October 10, 2005 Our first task is to develop the foundations that are necessary for the materials covered in this course. 1

More information

15-854: Approximation Algorithms Lecturer: Anupam Gupta Topic: Approximating Metrics by Tree Metrics Date: 10/19/2005 Scribe: Roy Liu

15-854: Approximation Algorithms Lecturer: Anupam Gupta Topic: Approximating Metrics by Tree Metrics Date: 10/19/2005 Scribe: Roy Liu 15-854: Approximation Algorithms Lecturer: Anupam Gupta Topic: Approximating Metrics by Tree Metrics Date: 10/19/2005 Scribe: Roy Liu 121 Introduction In this lecture, we show how to embed metric weighted

More information

Fréchet embeddings of negative type metrics

Fréchet embeddings of negative type metrics Fréchet embeddings of negative type metrics Sanjeev Arora James R Lee Assaf Naor Abstract We show that every n-point metric of negative type (in particular, every n-point subset of L 1 ) admits a Fréchet

More information

Machine Minimization for Scheduling Jobs with Interval Constraints

Machine Minimization for Scheduling Jobs with Interval Constraints Machine Minimization for Scheduling Jobs with Interval Constraints Julia Chuzhoy Sudipto Guha Sanjeev Khanna Joseph (Seffi) Naor Abstract The problem of scheduling jobs with interval constraints is a well-studied

More information

In this initial chapter, you will be introduced to, or more than likely be reminded of, a

In this initial chapter, you will be introduced to, or more than likely be reminded of, a 1 Sets In this initial chapter, you will be introduced to, or more than likely be reminded of, a fundamental idea that occurs throughout mathematics: sets. Indeed, a set is an object from which every mathematical

More information

Approximation Algorithms for Re-optimization

Approximation Algorithms for Re-optimization Approximation Algorithms for Re-optimization DRAFT PLEASE DO NOT CITE Dean Alderucci Table of Contents 1.Introduction... 2 2.Overview of the Current State of Re-Optimization Research... 3 2.1.General Results

More information

INVERSE FUNCTION THEOREM and SURFACES IN R n

INVERSE FUNCTION THEOREM and SURFACES IN R n INVERSE FUNCTION THEOREM and SURFACES IN R n Let f C k (U; R n ), with U R n open. Assume df(a) GL(R n ), where a U. The Inverse Function Theorem says there is an open neighborhood V U of a in R n so that

More information

Topology. Xiaolong Han. Department of Mathematics, California State University, Northridge, CA 91330, USA address:

Topology. Xiaolong Han. Department of Mathematics, California State University, Northridge, CA 91330, USA  address: Topology Xiaolong Han Department of Mathematics, California State University, Northridge, CA 91330, USA E-mail address: Xiaolong.Han@csun.edu Remark. You are entitled to a reward of 1 point toward a homework

More information

Parameterized Complexity of the Sparsest k-subgraph Problem in Chordal Graphs

Parameterized Complexity of the Sparsest k-subgraph Problem in Chordal Graphs Parameterized Complexity of the Sparsest k-subgraph Problem in Chordal Graphs Marin Bougeret, Nicolas Bousquet, Rodolphe Giroudeau, and Rémi Watrigant LIRMM, Université Montpellier, France Abstract. In

More information

Maths 212: Homework Solutions

Maths 212: Homework Solutions Maths 212: Homework Solutions 1. The definition of A ensures that x π for all x A, so π is an upper bound of A. To show it is the least upper bound, suppose x < π and consider two cases. If x < 1, then

More information

RECOVERY OF NON-LINEAR CONDUCTIVITIES FOR CIRCULAR PLANAR GRAPHS

RECOVERY OF NON-LINEAR CONDUCTIVITIES FOR CIRCULAR PLANAR GRAPHS RECOVERY OF NON-LINEAR CONDUCTIVITIES FOR CIRCULAR PLANAR GRAPHS WILL JOHNSON Abstract. We consider the problem of recovering nonlinear conductances in a circular planar graph. If the graph is critical

More information

Observation 4.1 G has a proper separation of order 0 if and only if G is disconnected.

Observation 4.1 G has a proper separation of order 0 if and only if G is disconnected. 4 Connectivity 2-connectivity Separation: A separation of G of order k is a pair of subgraphs (H, K) with H K = G and E(H K) = and V (H) V (K) = k. Such a separation is proper if V (H) \ V (K) and V (K)

More information

(x k ) sequence in F, lim x k = x x F. If F : R n R is a function, level sets and sublevel sets of F are any sets of the form (respectively);

(x k ) sequence in F, lim x k = x x F. If F : R n R is a function, level sets and sublevel sets of F are any sets of the form (respectively); STABILITY OF EQUILIBRIA AND LIAPUNOV FUNCTIONS. By topological properties in general we mean qualitative geometric properties (of subsets of R n or of functions in R n ), that is, those that don t depend

More information

Greedy Trees, Caterpillars, and Wiener-Type Graph Invariants

Greedy Trees, Caterpillars, and Wiener-Type Graph Invariants Georgia Southern University Digital Commons@Georgia Southern Mathematical Sciences Faculty Publications Mathematical Sciences, Department of 2012 Greedy Trees, Caterpillars, and Wiener-Type Graph Invariants

More information

HW Graph Theory SOLUTIONS (hbovik) - Q

HW Graph Theory SOLUTIONS (hbovik) - Q 1, Diestel 3.5: Deduce the k = 2 case of Menger s theorem (3.3.1) from Proposition 3.1.1. Let G be 2-connected, and let A and B be 2-sets. We handle some special cases (thus later in the induction if these

More information

Spanning and Independence Properties of Finite Frames

Spanning and Independence Properties of Finite Frames Chapter 1 Spanning and Independence Properties of Finite Frames Peter G. Casazza and Darrin Speegle Abstract The fundamental notion of frame theory is redundancy. It is this property which makes frames

More information

Topic: Balanced Cut, Sparsest Cut, and Metric Embeddings Date: 3/21/2007

Topic: Balanced Cut, Sparsest Cut, and Metric Embeddings Date: 3/21/2007 CS880: Approximations Algorithms Scribe: Tom Watson Lecturer: Shuchi Chawla Topic: Balanced Cut, Sparsest Cut, and Metric Embeddings Date: 3/21/2007 In the last lecture, we described an O(log k log D)-approximation

More information